[German]A vulnerability in the systemd component of some Linux distributions can be exploited over the network. A single DHCPv6 package is enough to provoke a crash or more.
The Register discusses the vulnerability within this article. The CVE-2018-15688 vulnerability, released on October 26, 2018, is located in the DHCPv6 client of the open source system management suite, which is integrated in various variants of Linux. According to this post there is a vulnerability in the systemd-networkd DHCPv6 client (this has been completely reimplemented). The DHCPv6 client is automatically enabled on managed interfaces when IPv6 router advertising packets are received. Red Hat writes about this::
systemd-networkd is vulnerable to an out-of-bounds heap write in the DHCPv6 client when handling options sent by network adjacent DHCP servers. A attacker could exploit this via malicious DHCP server to corrupt heap memory on client machines, resulting in a denial of service or potential code execution..
In addition to Ubuntu and Red Hat Enterprise Linux, Systemd has been adopted as service manager for Debian, Fedora, CoreOS, Mint and SUSE Linux Enterprise Server. The Register writes within this article, however, that RHEL 7 does not use at least the vulnerable component by default. The developer of Systemd, Leonard Poettering, has already released a fix. The fix should be distributed to the affected distributions soon. Details can be found at The Register.